Group Security of V2Vusing Cloud Computing Processing and 4G

Group Security of V2Vusing Cloud Computing
Processing and 4G Wireless Services
BISWAJIT PANJA, DAVID MORRISON
University of Michigan-Flint Flint, MI
PRIYANKAMEHARIA
Eastern Michigan University, Ypsilanti, MI
BHARAT BHARGAVA
Purdue University, West Lafayette, IN
and
ATUL PRAKASH
University of Michigan, Ann Arbor, MI
Vehicle to Vehicle (V2V) interfaces will provide the future of safe driving. Implemented along V2I (Vehicle to
Interface) setups, a driver will be more aware of their surroundings and traffic will be less of a hazard. Companies
such as Google are trying to make cars that drive themselves through external sensors and internal maps. The
security issues in V2V communication are vast and still being solved. Telecommunication companies have been
working in turn to implement cloud computing to improve what they can offer their data users. They have been
consistent with their improvements of coverage and data transfer speed. The creation of 4G LTE has shown great
promise for what can be done with data transfers and minimizing tower loads.
This research paper takes a look at how the system can be protected against outside intrusions. It uses a Cloud
to do computations, making it more difficult to steal data from the cars themselves. The system is designed to
be in constant communication with the cloud to prevent any data theft, and presents methods for encrypting the
data sent between the cloud and the cars. It also addresses the issue of tower load, by creating car groups to lower
the difficulty of communicating in high traffic situations. These car groups communicate with one car, the lead
car which is the only car that is communicating directly with the cloud. It sends and receives messages which
are then distributed amongst the group, including but not limited to car locations, media and security keys. Cars
that are separated from a group are treated as the lead car of a single car group, and cars that are completely
separated from the system must first validate themselves through the cloud.
Keywords: V2V, Cloud Computing, 4G, Security
1.
INTRODUCTION
Vehicle to Vehicle (V2V) and Vehicle to Infrastructure (V2I) are a promising technology to
improve safety and optimize traffic flow. Research has been done on identification of threats,
specification of security mechanisms and how to adapt cryptographic primitives to a V2V/V2I
model. There are a number of threats to the V2V/V2I system. A jammer can be used to stop
any transmissions from traffic signals, because it remains in a local place, and can be placed
relatively easily. Fake signals can then be broadcast, causing accidents if the vehicle doesn’t
know about hazards. Any node in the relay can also disrupt other nodes, causing the whole
system to have problems. This also affects the driver’s privacy, as their personal information
could be accessed from the car. It is important to investigate vulnerabilities in the system. Some
of the requirements of security in the system include authentication of transmissions, keeping
data consistent, non-repudiation, and keeping clients private information secure.
Cloud computing has been revolutionary to the IT industry, and also used as V2C [Alexiou
et al. 2013; Sagstetter et al. 2013; Alexiou et al. 2013; ?], a Vehicle to cloud infrastructure
that used the Network as a service (Naas) architecture. Cloud computing has been targeted to
International Journal of Next-Generation Computing, Vol. 5, No. 3, November 2014.
Group Security of V2Vusing Cloud Computing Processing and 4G Wireless Services
·
219
large and medium scale operations and has a number of problems. The European project SAIL
introduces a new solution, Naas to replace the three existing cloud types; Software, Infrastructure,
and Platform as a service (Saas, Iaas, and Paas). There have been a number of related projects,
including Intel’s WiMax connected car and Toyota’s LTE connected car. The government has
allocated part of the spectrum [Crosby and Vafa 2013] for wireless vehicles. 4G has also been
proposed to be used, but in order to do some a number of security issues must be addressed.
The key objective of inter-vehicular communication is to increase driver and vehicle safety
[Tsuboi et al. 2014; Wang et al. 2014; Liao et al. 2013; Panja et al. 2014; Baldini et al. 2013].
There are both passive and active ways of improving vehicle safety. Passive ways include seatbelts
and airbags, while active ways include steer assist and lane reading. Inter Vehicle Area Networks
(VAN) can share such information between vehicles. This includes Vehicle to Vehicle (V2V),
Vehicle to Broadband Cloud (V2B), and Vehicle to Infrastructure (V2I). V2I communicates to
roadside units (RSU), sending and receiving information.
Cyber security on non-computers is a new and growing issue. Modern cars have more intelligent
MCU(micro controller unit)’s, more code, and therefore more risks to cyber-attack. Initially,
companies made wireless communication devices in cars for simple tasks, such as emergency
contact and gps. As we continue to push forward, they want to include V2V(vehicle to vehicle)
communication and vehicle to device(cell phone, mp3, etc.) communication. From July to
November 2011, malware on Android increased 472%. Once they communicate with a vehicle,
they could easily infect it. The CVSS (Common Vulnerability Score System) can be used to
check how vulnerable V2V system is. 376,000 vehicles of a certain model were built in the US
and Canada in 2009.
The purpose of this paper is to implement a useable security solution for a V2V (Vehicle to
Vehicle) network. We propose an approach for group security.
Figure 1
A cloud is responsible for storing all information and doing most of the calculation, seeing as
it has more processing power. Each cell tower is connected to the cloud, and relay information
to and from it. Each cell tower connects to a certain amount of “Car Groups”. Each car in the
group is connected to each other car, and the group is connected to the tower through the car
with the best connection. This keeps every car connected, as long as it is close to a car with a
connection, in cases where one loses connection in a tunnel. This requires a secure check to link
into a group. If the car isn’t in the group, it will be in its own group and connected to the tower.
This means that joining a group can be done from the cloud. Every few minutes, each car will
receive a security key. This key will be stored with the vehicle identification number. If the car
is not in a group and loses its connection, the car may rejoin if its key matches that stored in its
VIN, because it will be unable to change its key without a connection. The key will have to be
International Journal of Next-Generation Computing, Vol. 5, No. 3, November 2014.
220
·
Panja et al.
stored in the car in such a way that it is impossible to extract it, or you could easily connect any
vehicle by sending a fake VIN and key. We would use a container that incinerates its contents if
it is opened. Protecting the connection to the cloud is extremely important in this system. If for
any reason it was tampered with, it could send harmful programs to the cloud.
Figure 2
This paper is split up into 4 sections. First, some background to the problem will be introduced.
Second, we will lay out a V2V network in which our security scheme is planned around. Next,
we will introduce our security theme. Finally, we will look at any potential problems with our
scheme.
2.
RELATED WORK
SEVECOM [Leinmuüller et al. 2006] is the first phase of a long term undertaking of implementing
V2V. SEVECOM investigates how to detect intrusions, how to keep data consistent and how to
secure your position at all times. It looks into designing a user interface and cryptographic
primitives that address issues in inter-vehicle communication. Implementing security services
requires the ability to store sensitive data. However, service providers and owners should not
have access to some of this data. The solution is creating tamper resistant modules. These might
include environment detection sensors (detect abnormal changes in environment around it), which
are a Level 4 security device. A level one device might just be a physical protection, like a difficult
to open casing. Smart cards are considered to be trustable and provide decent protection, but
may not provide enough protection. On the other end of the spectrum, the IBM 4758 PCI board
provides a lot of protection, but is also extremely expensive. It will take time to find a balance
between the right level of security and the price of the system. It is important to choose a Public
Key Cryptosystem (PKCS) with decent implementation overhead and a decent execution speed.
Also one that has the proper key, signature, and certification sizes. When choosing the PKCS,
the Elliptic Curve Digital Signature Algorithm (ECDSA) and the NTRUSign outperform the
RSA sign.
Cloud based navigation [Rangarajan et al. 2012] allows requests from the user to find routes
with low traffic, or the fastest way home. This can be managed better by infrastructure providers,
who can manage large data centers to compute multiple routes, specified by the automobile user.
A major advantage of the new network capabilities is the ability to send street views of the area.
Infotainment includes being able to have video conferencing from the car, as well as multimedia
streaming. Compared to the three major models (Google, IBM and Eucalyptus), the V2C model
fairs as well or better in Access Control, Packet and circuit switched network convergence, OnDemand network provisioning, Packet-based access quality, Auditing and assurance function,
Stateful VM migration and Software network abstraction place. It does however lack Multi-Level
Security, as it is in its early stages still. This paper proposed a V2C model as a solution for
Vehicular communication.
International Journal of Next-Generation Computing, Vol. 5, No. 3, November 2014.
Group Security of V2Vusing Cloud Computing Processing and 4G Wireless Services
·
221
While Vehicle to Vehicle (V2V) communication [Mangel and Hartenstein 2011] could be done
with dedicated short range communication, it could also be done with cell networks to possibly
provide better coverage. This paper attempts to predict how much load would be on each
tower cell. Using UMTS (3G) or LTE (4G) communications to provide coverage for Cooperative
Awareness Messages (CAM), cars will be able to communicate location, speed, and heading.
UMTS was found to be barely able to handle 1500 CAM transmissions per second in a single
channel, but LTE should be able to provide sufficient coverage. The capacity for a cell system to
support this system depends on a number of factors. Having an available bandwidth, being able
to broadcast and receive separately as opposed to together, being able to split load into multiple
channels, and how many vehicles are in each tower range. Currently, no load problems have
arisen from general traffic information and hazard warnings on LTE and UMTS. However, load
demands go up as cars communicate. To get data, Munich’s cell tower locations were found, and
matched to the providers. GSM and UMTS are what are currently used, and while GSM is too
old to use, it is on a frequency similar to LTE so it is analyzed. A Voronoi diagram composition
splits each area into cells, which are covered by a certain number of towers. These will be used
to check load on towers. Cells are thrown out if they are too large or too small for use.
Almost all research citeCalandriello2011 on Vehicular Communication (VC) has been focused
on beaconing a status, and even so this can leave VC systems vulnerable. Projects such as Sevecom, Now, and Car to Car communication consortium have been working on security solutions.
Security mechanisms protect traffic signals sent by each vehicle around every 1-3 hundred ms.
However, under dense network conditions, security becomes difficult, posing the question are
secure VC systems practical? This paper aims to answer that. There are 5 things that should
be considered. Communication technology, system resources, network configuration and environmental factors, security protocols and supported applications. A baseline pseudonym (BP)
scheme is where the Certification Authority (CA) issues short-lived keys that don’t identify the
vehicle, then sign messages with the corresponding key. Group Signatures (GS) are proposed as
each vehicle self generates its own keys. However, they wish to use Hybrid Pseudonyms (HP).
HP is when a node (car) generates its own keys, and each key is validated as a group, so that
the vehicles are not identified. There are a few optimizations that can be made for both BP and
HP. All tests were performed with Centrino 1.5 GHz. While this is powerful compared to what
current systems use, it is a test for future systems. Communication reliability is very important
to the solution, and depends on the channel properties and load. The heavier the channel load,
the more likely for collisions to occur.
Controlling multiple Unmanned Autonomous Vehicles(UAV) using Spatially Secure Group
Communication(SSGC) is the framework of this paper. Unmanned aerial vehicles have been
deployed for many missions, and typically collaborate to exchange time critical information.
However, a proper communication form is vital to controlling them as a group. This communication brings new problems. Communication congestion increases as the group size increases.
Long range communication such as satellite communication is easier to hack into, so it is not
preferable to close range communication. This paper defines the SSGC problem, presents an
analytical model, investigates secure UAV communication and proposes a distributed solution.
Relations between UAV systems and animals have inspired a solution based on nature.
Cloud computing is the newest way for businesses to share information. It is easier to use and
control then older methods. With a new method brings new challenges. In order to protect the
client, the Service Level Agreement (SLA) is the first line of defense.
The telecommunication industry [Zhu and Martinez 2012; Leinmuüller et al. 2006; Seong-Woo
and Seung-Woo 2012] has helped turn the internet into a mobile environment and must embrace
the cloud in order to remain competitive. Outlined in this paper are the challenges that must be
addressed in order for this to take place. While telecommunication companies could forward data
from clients to cloud services, a unique opportunity arises for the telecommunication companies
to offer cloud services directly to clients. The data retrieved from working with their clients
International Journal of Next-Generation Computing, Vol. 5, No. 3, November 2014.
222
·
Panja et al.
will give them an advantage over other cloud based services. In order to use cloud services, the
telecommunications industry will have them connect to Evolved NodeBs(eNBs) in the case of 4G
LTE, which can be shared among multiple Mobile Network Operators. The eNBs is what sends
out the signal for 4G LTE, so it is important that the cloud used can isolate data from different
users and routed due to pre-determined rules. There are a number of challenges that come with
cloud computing in the telecommunication industry. The first is a mix of legal and regulatory
challenges.
3.
PROPOSED APPROACH
This system has a number of difficulties it must overcome in order to be put into place. First,
all cars must be able to communicate with a single cloud. This means that car companies
would have to agree on using one cloud, or that the cloud would have to be implemented by
the government for road safety. If car companies did use separate cloud frameworks, they would
have to communicate with each other in order to have a complete road safety map. Second, this
system requires a decent amount of cell towers at a level of 3g communication or higher. This
means that areas that are very rural will have more trouble connecting. This is actually not
bad, because most rural areas have fewer people and therefore less vehicles to monitor, lowering
tower load. Third, a car which loses its ability to store data i.e: hard drive crash would have
to be added to the network through a car dealer, because it would no longer have its key to
rejoin the cloud. While dealer repairs are expensive, most car shops do not have the tools to fix
many computer problems in cars, so this would not be too big of an issue. One final problem
is propagation delay. The cloud will be solving problems that occurred nanoseconds earlier and
then sending back replies a number of nanoseconds later. If the car is gathering the data itself,
data coming in will be as late as a second before being gathered, sent, processed, and received.
At 60 miles per hour your car will travel 88 feet before it receives this data. This problem can be
solved by using better data transmission technology such as 4g LTE and minimizing tower load.
It can also be helped by improving technology on data retrieval.
Notations used: i = information packet
K = key private
K1, K2 = key public
EK1 (i|RSA) = encryption function private
EK (i|Cmac) = encryption function public
DK (i) = decryption function
L = lead car
LS = lead solo car
Cn = car group n
cnm = car n in group m
T = cell tower
S = cloud server
The system this research examined was a vehicle to cloud interface. The cloud creates groups
out of each set of cars in a tower radius. S creates C1 , C2 , . . . Cn with cars c1n , c2n , . . . cmn . The
size of the group will be based on the current load of the tower, with larger groups as the load
goes up. In each group, the cars communicate with each other. The car with the best connection
within a certain tolerance will be considered the lead car (L) and therefore the only one that
communicates directly with the cloud (S). This allows cars in tunnels or with poor reception to
communicate through other members of its group.
This design is as much for use as security, because as long as the car is connected to the cloud,
it is much harder to tamper with it. The cloud will communicate using IEEE802.11p [2, 3] the
current protocol for this type of system. If a car is alone or disconnected, it is treated as its
own group, and the cloud searches for a new group to add it to based on gps information. The
tower is connected to a Platform as a Service (PaaS) cloud structure which uses its software to
International Journal of Next-Generation Computing, Vol. 5, No. 3, November 2014.
Group Security of V2Vusing Cloud Computing Processing and 4G Wireless Services
·
223
Figure 3
make all decisions the cars need. The cloud is responsible for making groups out of the cars,
monitoring car positions to prevent collisions, streaming media applications and even generating
security information such as keys.
Information that will be sent from a car to the tower will be in the form of a set of GPS
coordinates. These will be in a form similar to (xxx x2 x2 x3 x3 , yyy y2 y2 y3 y3 ) where (x, y)
are our longitude and latitude coordinates respectively with (x2 , y2 ) representing minutes and
(x3 , y3 ) representing seconds. The information will be used to determine where a car is at a
given time, allowing the cloud to perform any calculations it needs. The information returned
will be a list of cars in the group, as determined by the cars ip addresses. It would also include
information about the lead car. This would be sent in the form (z1 , z2 , . . . , zn ), for a group of
n cars where z1 is the lead car. These data sets will be sent as packet iin our system. If a car
needs to be added to the group, a set of keys will be sent out in the form (znewcar , DK (i)) which
ensures that the incoming car can be recognized, and its message can be decoded. Upon entry,
the cloud will send a new set of keys to the lead car for distribution. Data is frequently moving
in a V2V system. Initially, data will be sent from the cloud to the tower. S uses EK (i|CCM )
T which uses DK (i) to decrypt. This will be passed using a land line as cipher text. It will
be encrypted using CCM , with a new key generated at a regular interval. From here, the tower
will send the information to the lead car, using a public encryption. This means that the tower
will require a computer of its own, in which to convert. The keys for the tower and lead car will
be cycled regularly, based on the towers load information and the group size in question. The
data will be encrypted using RSA , with cMac authentication, and the Ctr encryption mode. T
uses EK1 (i|RSA) and sends it to L, which decodes it as DK2 (i). Each group will communicate
using a private key. L of group n will send out its messages encrypted EK (i|CCM ) and sent to
each car to decode DK (i). This key will be sent from the tower and cycled whenever the group
status changes, for example when a car is added or leaves, or when the lead car is switched. The
key will then be distributed amongst the group by the lead car. If a car is alone, it is treated as
a lead car LS and sent a set of public keys. The cloud will also recognize it as a solo car so it
will not receive a private key. S sends Ek1 (i|RSA) to LS and LS uses DK2 (i).
In order for this car to join a group, the cloud must determine that the car should be added.
At this time, the lead car of that group and the solo car will each be sent a private key.
From here handshake protocol can take place between the two cars. LSuses EK(i — CCM)
and sends it to L to decrypt using DK(i). The solo car will not be able to communicate using
other cars in the group, so it must be close enough to the lead car.
After handshake protocol, the lead car or new lead car (if the solo car had a better connection)
will be sent a new private key for the group and distribute it out. If the solo car becomes the
lead car it will send the key to the old lead car to distribute.
If a car is disconnected from its group and the tower, it will store its latest key (public or
International Journal of Next-Generation Computing, Vol. 5, No. 3, November 2014.
224
·
Panja et al.
Figure 4
Figure 5
Figure 6
private) and continue to search or a signal. Once a signal is found, the car will send out a join
request to the cloud in plain text and an encrypted handshake protocol. This will consist of the
vehicles VIN number. The cloud will look under the vehicles VIN to find the last key the car
was using and decode the handshake. It will then return its own handshake and a public key for
the car to begin using. From here, it will be a solo car until it joins a group. By cycling keys
International Journal of Next-Generation Computing, Vol. 5, No. 3, November 2014.
Group Security of V2Vusing Cloud Computing Processing and 4G Wireless Services
·
225
Figure 7
every time a car enters or leaves the group, the goal is to make every separated car have its own
unique key. RSA was chosen due to its wide usage making it easier for all cars to use the same
system if multiple companies are using the same network.
4.
ANALYSIS AND MESSAGE FLOW
There are a number of functions that will need to be performed by both the cloud and the group
of cars in order for this proposition to be feasible. The cloud needs to be able to calculate the
location of each car, and track how groups will be formed. In order to do this, let us define a set
of cars C = (C1 , C2 , . . . , Cn ) in some group being tracked by the cloud, with car C1 being the
lead car. These cars will send information in the form G = (G1 , G2 , . . . , Gn ), where G is a set of
GPS coordinates. The cloud will therefore receive set G for its associated set G. The cloud will
use its new information G, along with the previous auto locations G’ to create a set of vectors
V . Given Gi and Gi ’, we can produce Vi in V . Vi = ¡(xxx − x0 x0 x0 , x2 x2 − x02 x02 , x3 x3 − x03 x03 ),
(yyy − y 0 y 0 y 0 , y2 y2 − y20 y20 , y3 y3 − y30 y30 )¿ where x and y are latitude and longitude respectively.
Vector Vi will therefore be in the form ¡(X, X1 , X2 ), (Y, Y1 , Y2 )¿. Another function the cloud will
need to perform will be the creation of groups. This will be done based upon the tower load at
the time. We will start with a variable D in the range of 5 to 15 as an indicator of the change in
tower load.
From here, we will use some variable S as a 0 - 10 ranking to determine the current load of the
tower. The cloud will compute the ceiling of (D × S) / 10, using that value to determine whether
to increase or decrease group size. If ceil[(D × S) / 10] ¡ Cars in groups remove a car from each
group. If ceil[(D × S) / 10] ¿ Cars in groups add a car to each group. Otherwise leave the groups
alone. This will ensure that the tower load is not too high. Groups will be formed using a greedy
function. Each cars connection will be looked at as a set Cconn = (C1 , C2 , . . . , Cm ) for some m
cars connected to the tower. The connection of each car will be ranked, with the best connections
at the top of the list. From here, the top O cars, where O = the number of cars per group /
m will be selected for use as lead cars. Once these cars are established as leads, the distance of
each car from a lead can be established. For some car with coordinates C = (xxx x2 x2 x3 x3 ,
yyy y2 y2 y3 y3 ), we can find its approximate distance from a lead car C’ by ((xxx − x0 x0 x0 )2 +
(yyy − y 0 y 0 y 0 )2)1/2, ((x2 x2 − x02 x02 )2 + (y2 y2 − y20 y20 )2)1/2, ((x3 x3 − x03 x03 )2 + (y3 y3 − y30 y30 )2)1/2.
Using this method, we can determine the cars nearest to each lead car. Once we have this, we
can form groups equal to the ceil[(D × S) / 10]. Our private encryption will be RSA. Our key will
be generated by as a set of prime numbers U1 , U2 . This will be our private key. These numbers
will be generated in the range 10100 to 10200 . We will use these to generate our the first part of
our public key P = U1 × U2 . P is the modulus for our keys, and its length will be the key length.
From here, we will compute some n such that n = (U1 − 1)(U2 − 1). We will use this number to
International Journal of Next-Generation Computing, Vol. 5, No. 3, November 2014.
226
·
Panja et al.
generate some e such that e < n and gcd(e, n) = 1. This will be sent as part of our public key.
To encrypt our message M , we will compute C = M e (modP ). C will be our encrypted message.
C will then be returned, along with our public and private key. It is now
time to decrypt this message. We create some d = (1mod(n)/e). We then perform a binary
expansion on our d. This will give us some set of powers of 2, (d1 , . . . , dt ) where t is the last
term in the expansion. For each dt , we will calculate C dt (modP ). This will create some values
(P1 , . . . , Pt ). Finally, we will multiply Pt × P t × · · · × P1 (modP ) = M . This will be our decrypted
message. For CMAC encryption, we will begin by creating a message of length Wc , where W
is the Cipher Block Length and c is constant. This message will be split into W bits. We then
start with bit one and generate code c1 = E(W, W1 ) where our bits are W1 . . . Ww . We then
recursively work through the c0 s saying cn = E(W (W1 ⊕ cn−1 ))). Our code T = the s leftmost
bits of the bit string of bit length T . Our public key will be a set of two. The first part will
consist of K1 = Lx and K2 = L • x2 = (L • x) • x where multiplication (•) is done in the finite
field (2n) and x and x2 are first and second order polynomials that are elements of GF (2n).
Figure 8
The state diagram shows the steps for checking 1. Trust level 2. Bandwidth availability 3.
Processing power, in order to form groups. The starting state in the model is the “message
received from cloud”. The bandwidth, trust level and process power availability must meet the
requirement provided by the cloud. We have not showed any error and accepting states, because
we assume that each transaction for forming groups is atomic, meaning the parameters discussed
must meet the requirement or the transaction has to start over.
The message flow diagram is similar to state diagram with the steps for formation of groups.
Again, the requirements given by the cloud must be met in order to form groups. One of the
blocks which may have not discussed enough is the “location information”. This block helps
to find group of vehicles based on geographic information. All the groups are formed using the
International Journal of Next-Generation Computing, Vol. 5, No. 3, November 2014.
Group Security of V2Vusing Cloud Computing Processing and 4G Wireless Services
·
227
Figure 9
location behavior of vehicles. For example, if certain vehicles tend to stay in Ann Arbor, MI
for 5 out 7 days, they may belong to a group rather than mixing vehicles from other region say
Detroit.
5.
IMPLEMENTATION AND EXPERIMENTAL ANALYSIS
This section provides the implementation details and experimental analysis of the proposed approach. We start with a class diagram, which shows the major classes, data members, member
functions and interaction among themselves.The main classes we identified as 1. Cloud 2.Tower
3.Parent car 4.Child car. The private and public member functions are shown in each of the
classes.
The purpose of theexperiments is to test a cloud’s computing ability for creating groups on a
single tower, to see how much computing power will be required for a network of multiple towers.We start with an arbitrary cloud, set up with our software for creating groups and managing
our V2V system. We set up a map for the tower area which the cloud use to operate. The cloud
then sendsconstantly updating coordinates from make believe cars. First, the cloud plot them
on the map, and second it begins to group them. We set an upper limit for the tower load and
the cloud make groups according to that size limitation. As we continue, we add more cars to
the map which requires the cloud to continue adding to the groups. As the cloud computes, it
sends keys to its theoretical cars, which received by a computer we use to monitor its response
times.We observe the speed in which the cloud is able to return keys for its created groups, and
figure out the cloud size required for a nationwide system.
In order to analyze if there are significant differences in the amount of packets dropped based
on the number of cars in a system, we began by setting up an experiment in NS-2 to cause
dropped packets. We set up a wired connection between a number of nodes, which varied for
each trial of the test. We then passed packets over this connection and observed how packets
International Journal of Next-Generation Computing, Vol. 5, No. 3, November 2014.
228
·
Panja et al.
Figure 10
were dropped.
Figure 11
The above figure shows that the ratio of dropped packets to passed packets actually reduced
as the number of nodes increased. The data presented here shows that as nodes were added,
the ratio of completed to dropped packets is reduced. These tests were run using Droptail to
determine packet dropping. Packets are size of 100000 bits. The experiment used CBR over UDP
and FTP over TCP for two nodes communicating into one. Initial nodes used 10ms lag while all
others use 20 ms of lag. The ratio of dropped packets varies by about .006, or .6% of our passed
packets. This shows that while there is a little variation in the amount of dropped packets, it
is not a significant amount. We see no significant amount of packets lost with each change of
International Journal of Next-Generation Computing, Vol. 5, No. 3, November 2014.
Group Security of V2Vusing Cloud Computing Processing and 4G Wireless Services
·
229
size. However, for each set we notice that there are some dropped packets. This leads to a new
question. What is the minimum bandwidth required for no packet loss in each of our group sizes.
Figure 12
Above is our completion of a test to show what the minimum bandwidth is to prevent packet
dropping. We see that the 4 node test requires a significantly lower amount of bandwidth to
the 5, 6, and 7 systems. The Minimum Bandwidth was calculated to two decimal places. The
system setup used two nodes which connected together to a third node. All data then traveled in
a linear direction for the rest of the nodes. The data was set up for a packet size of 100 bits. The
experiment used CBR over UDP and FTP over TCP. Each node used 10ms of lag, with packets
being selected to drop in droptail fashion. We noted that there is a change in the number of
dropped packets depending upon how many nodes are in our system. However, this change is
nearly negligible; as it is so small it can be considered inconsequential. This allows our system
to use any number of cars in a group without worrying about losing packets as transmissions are
passed. We also came up with results which showed that the number of nodes in our system have
an effect on the minimum bandwidth required to have no dropped packets. If we have 4 nodes in
our system, we see a lower minimum bandwidth to prevent any packet dropping from occurring.
There were a number of limits to how these experiments were tested. The first is a restriction
of node usage. NS2 only allows for a maximum of 7 nodes to be used at one time. This means
that any group size larger than 7 would be untestable in this fashion. The second is the fact that
NS2 is only a simulator. It works on pre-programmed algorithms and cannot truly show how the
system will interact. Finally, the test was performed using a wired system, which may perform
differently.
To determine how powerful an in-car processor will need to be to handle being the lead car, that
is sending and receiving all messages with the cloud and distributing these messages throughout
a group. Based on experimental analysis we conclude it is completely possible to both encrypt
and decrypt rsa in our proposed vehicular network. If rsa encryption and time the encryption
and decryption of data is used the data will vary in length starting at a length of 1 ascii character
and ending at 100 in intervals of 5 characters. This will allow us to view how long the encryption
and decryption will take based upon the length of our message.
Starting with a rather powerful computer or Lead Car, messages will be sent to the lead car
from a computer simulating the tower. These messages will be deciphered using a public key,
and the messages will be encoded into cypher using a private key, and sent out to each car in
the group. In essence, each car will be a computer connected to the testing computer. These
”cars” will decode the message, and reply with a random set of coordinates in cipher text. The
lead car will then decipher these messages, encrypt them with its public key, and send them back
to the tower. We will start with a group size of one other car, and slowly increase the amount
of cars. To increase the amount of cars, the lead car will receive a key from the tower, and the
new computer will send initiate a handshake, using the same key. Once handshake is complete,
International Journal of Next-Generation Computing, Vol. 5, No. 3, November 2014.
230
·
Panja et al.
the lead car will have to distribute this new key to the group. We will monitor the lead cars
processor throughout this procedure.
Initial public and private keys, as well as keys for adding additional “cars”, coordinates to be
sent to the tower, as well as arbitrary instructions to be sent from the tower to the cars.
Figure 13
This experiment was performed on a general desktop computer with Pentium i5 processor at
a clock speed of 2.53 GHz. The data was retrieved from a java program in eclipse, which took
the time before and after encryption and decryption. It was then displayed for processing. This
made use of the RSA functionality in the java API. According to these results, we see very little
change in the level of encryption and decryption based on the length in characters. This tells us
that we can send multiple GPS coordinates in one string without much loss in time. We also note
that it take far less time to decrypt RSA than to encrypt, which means that more problems will
arise when trying to send a message then receiving one. This means that each car in the group
other than the lead car will have far less to process, as the lead car has to send many messages as
opposed to one or two.We are limited in a number of ways in this experiment. The computer we
used was more powerful than anything that would be considered for this car experiment. This
means that any problems that would arise in longer encryption may be overlooked. We are also
limited in the length of supported characters we can test. The maximum supported character
length is 117 characters. This was recorded, but was left out of the charts. Finally, this shows
us what the time it would take to encrypt would be if the processor wasn’t trying to do other
things as well. This is abstracted compared to the actual problem.
6.
CONCLUSION AND FUTURE WORK
In order for V2V technology to be secure, policies and procedures should be put in place to keep
hackers and threats at bay. Security needs to be transparent so that clients can see how there
info is protected. This includes the SLA. This paper has looked at the effect of group security on
V2V, and provided a framework to analyze performance of secure V2V system. In our proposed
approach, a cloud is responsible for storing all information and doing most of the computation.
Each cell tower is connected to the cloud, and relay information to and from it. Each cell tower
connects to a certain amount group of car. Each car in the group is connected to each other
car, and the group is connected to the tower through the car with the best connection. In our
scheme we concentrate on group security rather than individual security. For future work, it is
important the system be able to detect infection or abnormal condition real-time, in order to
inform the driver. Self-diagnosis, Self-detection and Self warning are important features. The
final suggestion to maintain safety is by tracking the key components more efficiently through
International Journal of Next-Generation Computing, Vol. 5, No. 3, November 2014.
Group Security of V2Vusing Cloud Computing Processing and 4G Wireless Services
·
231
design, such as brakes, doors and the engine. If a car is infected, these will be the most dangerous
to tamper with.
REFERENCES
Alexiou, N., Gisdakis, S., Laganà, M., and Papadimitratos, P. 2013. Towards a secure and privacy-preserving
multi-service vehicular architecture. In 14th International Symposium and Workshops on a World of Wireless,
Mobile and Multimedia Networks (WoWMoM). IEEE, Madrid, pp.1–6.
Alexiou, N., Laganà, M., Gisdakis, S., Khodaei, M., and Papadimitratos, P. 2013. Vespa: Vehicular security
and privacy-preserving architecture. In 2nd ACM workshop on Hot topics on wireless network security and
privacy. ACM, pp.19–24.
Baldini, G., Mahieu, V., Fovino, I. N., Trombetta, A., and Taddeo, M. 2013. Identity-based security systems
for vehicular ad-hoc networks. In International Conference on Connected Vehicles and Expo (ICCVE). IEEE,
pp. 672–678.
Crosby, G. V. and Vafa, F. 2013. Wireless sensor networks and lte-a network convergence. In 38th Conference
on Local Computer Networks (LCN). IEEE, Sydney, NSW, pp. 731–734.
Leinmuüller, T., Buttyan, L., Hubaux, J. P., Kargl, F., Kroh, R., Papadimitratos, P., Raya, M., and
Schoch, E. 2006. Sevecom - secure vehicle communication. In IST Mobile Summit.
Liao, C., Chang, J., Lee, I., and Venkatasubramanian, K. K. 2013. A trust model for vehicular network-based
incident reports. In 5th International Symposium on Wireless Vehicular Communications (WiVeC). IEEE,
Dresden, pp. 1–5.
Mangel, T. and Hartenstein, H. 2011. An analysis of data traffic in cellular networks caused by inter-vehicle
communication at intersections. In Intelligent Vehicles Symposium (IV). pp. 473–478.
Panja, B., Morrison, D., Turner, S., and Meharia, P. 2014. Integration of v2v with cloud computing to
provide group security through the use of 4g lte. In 9th International Conference on Cyber Warfare & Security.
Academic Conferences Limited, pp.167.
Rangarajan, S., Verma, M., Kannan, A., Sharma, A., and Schoen, I. 2012. V2c: a secure vehicle to cloud
framework for virtualized and on demand service provisioning. In International Conference on Advances in
Computing, Communications and Informatics.
Sagstetter, F., Lukasiewycz, M., Steinhorst, S., Wolf, M., Bouard, A., Harris, W. R., Jha, S., Peyrin, T.,
Poschmann, A., and Chakraborty, S. 2013. Security challenges in automotive hardware/software architecture
design. In Conference on Design, Automation and Test in Europe. EDA Consortium, pp. 458–463.
Seong-Woo, K. and Seung-Woo, S. 2012. Cooperative unmanned autonomous vehicle control for spatially
secure group communications. Selected Areas in Communications, IEEE Journal 30, 5 (June), pp.870 – 882.
Tsuboi, Tsutomu, and Sekiguchi, T. 2014. Optimization for wireless vehicular network system in urban area.
In Communication Technologies for Vehicles. Springer International Publishing, pp. 126–142.
Wang, E. K., Ye, Y., and Xu, X. 2014. Location-based distributed group key agreement scheme for vehicular
ad hoc network. International Journal of Distributed Sensor Networks.
Zhu, M. and Martinez, S. 2012. On resilient consensus against replay attacks in operator-vehicle networks. In
American Control Conference (ACC). pp.3553–3558.
International Journal of Next-Generation Computing, Vol. 5, No. 3, November 2014.
232
·
Panja et al.
Biswajit Panja is an assistant professor of computer science and University of MichiganFlint. His research is in the areas of scalable sensor networks, mobile ad hoc networks, and
network security. He has published over 20 peer reviewed papers and have secured grant
funding from NASA and KSTC. He has a PhD in computer science from the University
of Missouri-Rolla.
David Morrison is a Computer Science undergraduate major with a concentration in
Software Engineering at The University of Michigan-Flint. He lives in Romeo, Michigan.
His other interests include Mathematics and Music. He works with Dr. Panja as a UROP.
Priyanka Meharia is an Assistant professor of Accounting Information Systems at Eastern Michigan University. Her research is in the area of Audit, Control and Security of
Systems. She has published over 10 papers. She has PhD from University of Kentucky.
She is a Certified Public Accountant trained in software such as SAP ERP (Finance and
Control), Business Analytics using SAP BI tools, Microsoft Power BI, Audit software-Idea
and Ultratax.
Prof. Bharat Bhargava is currently a Professor of computer science at Purdue University. He received the BE degree from the Indian Institute of Science, and the MS
and PhD degrees in electrical engineering from Purdue University, West Lafayette, IN.
He His research involves mobile wireless networks, secure routing and dealing with malicious hosts, providing security in Service Oriented Architectures, adapting to attacks,
and experimental studies. His name has been included in the Book of Great Teachers at
Purdue University. Moreover, he was selected by the student chapter of ACM at Purdue
University for the Best Teacher Award. He is a fellow of the IEEE.
International Journal of Next-Generation Computing, Vol. 5, No. 3, November 2014.